5 ways to protect your data on the Internet

How dangerous is the theft of personal data

"Leaks of personal data can give fraudsters the opportunity to take action from victims, to gain the trust of friends / colleagues - or to use it for other illegal purposes," said Pentestit CTO Luka Safonov. According to him, such a crime can be called "identity theft."

 

"If an attacker gets information such as a user's name, phone number, and email address, they are more likely to be listed as potential victims of phishing - they will manage personalized records with malicious code or links to infected virus resources, such as on behalf of an acquaintance or company, the client he is, "says Sergey Hayruk of InfoWatch. Research shows that users are inattentive to such parcels - 40% of participants in the experiment opened such letters and followed an unreliable link.

 

This data is also requested by spammers and advertising agencies. "In contrast to the questionnaire, where customers often enter search or fictitious contact data, in the number of offices of electronic services, users are more likely to provide reliable information," - says Dmitry Kuznetsov, Director of Methodology and Standardization Positive Technologies. Contact information can be used to gather information about people, selection of passwords passwords passwords passwords passwords passwords passwords passwords passwords passwords passwords passwords passwords passwords passwords passwords. “But very few people face such actions in practice, and they are seriously afraid of KuKen Amatsya SuKen Amatsya SuKen Amatsya Kuken Amatsekokukie Amasatsya.

 

You can protect yourself from hackers with the help of the rules of "digital hygiene". Here are the main ones.

Get a special email

According to Sergei Khairuk, the main problem is the careless attitude of users to personal data. "Often, people recklessly give away their phone number or email address to participate in various marketing research or to receive bonus cards, and it is difficult to predict how many resources store this data," he said. The expert recommends not to indicate in the questionnaires the e-mail box that is used for important tasks, and not to use a personal mailbox for work correspondence.

 

"To protect yourself from the actions of criminals, it makes sense to create a separate e-mail for such services," - suggests the head of anti-virus research "Kaspersky Lab" Vyacheslav Zakorzhevsky.

 

 Use complex questions and passwords

According to the head of the Zecurion analytical center Vladimir Ulyanov, if the e-mail address is not highlighted anywhere, the attacker will not go through everything in the world of combinations of e-mail addresses. If there is a specific e-mail, you can try to hack it. For example, try standard passwords. “As practice shows, most people use a limited, rather primitive set. Such mails are hacked into two accounts, ”he says.

 

Attackers can try to gain access to your mailbox by answering secret questions. Therefore, you should not use the questions "Name your mother's maiden name" or "What is your dog's nickname" - the answers can be found on your social networks. It is better to choose something out of the ordinary. "If you come up with a password of 15 characters in upper and lower case with numbers and special characters, attackers will not waste time on your account, hacking a hundred lighter," - says Ulyanov. He reminds that you should not use the same password for all accounts. "All store news, deals and sales can be dropped in a separate box, where the password can be at least" 1111 ". Really serious services are better protected by strong passwords ", - the expert advises.

 

 Use a virtual card

Vyacheslav Zakorzhevsky from Kaspersky Lab offers to use a bank card with a small amount of funds, including a virtual one, for online purchases.

 

Tinkoff Bank, for example, has the opportunity to start one through a mobile application. Alfa-Bank allows you to save money to an additional account, which cannot be accessed by card number.

 

 Do not install anything on the phone

You should not visit questionable links, even those sent by acquaintances, and install applications from untrusted sources, advises Luka Safonov. When installing and using applications, check what rights and information they request. "In case of any suspicious request, carefully check the e-mail of the person who wrote you a message to make sure that he is the person he claims to be, do not follow the links and do not open attachments if you are not sure that they are addressed to you," he said. Vyacheslav Zakorzhevsky from Kaspersky Lab.

 

It is also worth using licensed programs and regularly updating them, reminds the head of the "Information Security Technology" IT cluster of the Skolkovo Foundation Anton Ivanov. "Installing additional information security tools will help you not only create a barrier for fraudsters, but also gather evidence," he said.

 

 Do not tell the whole truth

Quite often, in order to receive a bonus card or access the service, users are asked to fill out a questionnaire, but it is not necessary to leave real personal data. "If you make a purchase in an online store and you are required to enter a date of birth, this data can be used both for you - to send a gift or give an additional discount, and against you, especially if the information leaks somewhere," says Vladimir Ulyanov from Zecurion. You can postpone the date of birth for a couple of days - and you will receive a gift and protect the data. You can change one letter in the last name if it is uncritical for delivery.

Comments

You must be logged in to post a comment.